Community Record
40
Posts
4
Kudos
0
Solutions
Badges
We need to authenticate many users via an external captive portal, but without RADIUS/LDAP etc, so using Meraki Cloud Authentication: Is there a limit, on how many devices we can have authenticate against a pre-configured Meraki guest user (configured in Network > Users like so). We have enabled the "Allow simultaneous logins" option, but nowhere is a limit mentioned. We don't need to know, nor care about the user's username (we've already validated them during the captive portal phase), we're merely using this pre-configured username/password in order to authenticate them at the end of the captive portal journey and get them online. The network could have upwards of 10,000 users per day using this username/password. (The user never knows about this user/pass, its all done from our server side via the login_url as part of the normal external captive portal flow). We can't use the splash with "click through" as we're authenticating the user from the server side API call (once they hit our external captive portal etc), not from the users browser by way of redirects, and click through relies on the p_splash_session cookie which the external server does not have access to as it's set on the nxx.network-auth.com URL initially. Thanks
... View more
Aug 13 2023
2:00 AM
Thanks. As per above then, is there a limit of clients? Meraki's group policy page says 3,000 for manually applied, however I've been able to add 70,000 without error...
... View more
Aug 12 2023
4:06 PM
I don't follow. 1. You create a template and add all your networks to it. 2. You create a group policy inside the template. 3. You assign clients to the group policy. As the group policy is mapped to the template, isn't any client added to the group policy mapped to all networks? Are you saying that despite having a group policy at template level, you still have to go into each network separately and add a client to the group policy, for the same MAC?
... View more
Aug 12 2023
3:58 PM
So if I apply all networks in the org to a template, and add the clients to a group policy defined on the template, the clients will get assigned the policy on ALL networks mapped to the template?
... View more
Aug 12 2023
1:46 PM
Thanks @RaphaelL and @alemabrahao. I thought as much. I read the same about the 3,000 limit for group policies. I've tested, via API, adding tends of thousands of client MACs and it's accepted it just fine, so now not so sure: If using network templates, can you do group policies within them? Thanks
... View more
Aug 12 2023
9:33 AM
If you have 5000 networks, and you want to apply a custom group policy to some clients across your org, how can this be achieved without creating 5000 group policies (one per network) and mapping the client to each network's created group policy? Basically, we are looking to assign some clients a particular policy across the estate. Also, how many clients can be added to a group policy? We need potentially 100k+. Thanks
... View more
Yeah, got a ticket open but their support not yet finding anything, even though it has to be 100% the Meraki RADIUS cloud as it is that which sends the RADIUS packets out (not the AP or from customer premise) It's not the specific RADIUS proxy option, but when you enable splash page with RADIUS authentication, all RADIUS traffic comes from the Meraki cloud
... View more
Since 12/13 April we've seen an issue across our customer estate (both In Europe and Americas) where the Meraki Cloud RADIUS client has stopped sending us Accounting Interim and Stop packets. We do get the Start packet, however. This is for captive portal authentications (not WPA2-Enterprise) This causes a problem because the Interim and Stop packets are needed to read the attributes that include how long the session length was, and how much download/upload usage for the session etc. The Start packet looks like: User-Name = "abc123"
NAS-IP-Address = 209.206.50.44
NAS-Port = 0
Service-Type = Login-User
Framed-IP-Address = 10.3.8.112
Called-Station-Id = "E4-55-A8-AA-BB-CC:ssid"
Calling-Station-Id = "A6-96-DA-AA-BB-CC"
NAS-Identifier = "Meraki Cloud Controller RADIUS client"
NAS-Port-Type = Wireless-802.11
Acct-Status-Type = Start
Acct-Delay-Time = 0
Acct-Session-Id = "825284631727869728"
Event-Timestamp = "May 19 2023 20:33:37 UTC"
NAS-Port-Id = "Wireless-802.11"
Meraki-Device-Name = "AP-Name-Here"
Authenticator-Field = 0x8c8d2982acee4ebbc1bd4c877dab3776 Normally, once the Start packet occurs, Interim updates are sent every five minutes until such a time when the session ends, then a Stop packet is sent. We're not receiving these packets at all, across hundreds of different customers. We're performed a raw packet capture on our RADIUS server(s) and the packet doesn't even reach us, so the Meraki Cloud is not sending them. Anyone else seeing this behaviour? Thanks, James
... View more
May 31 2021
10:56 AM
Interested to know more on what you use the "Called-Station-Id" for when using the proxy, and why the format can't be changed? 🙂 Thanks
... View more
May 27 2021
9:19 PM
I really don't understand this decision. Why introduce a feature to make it more flexible, then take it away? Is there a technical reason why Meraki can't allow a customised Called-Station-Id format? This means your systems do not match and have no parity. This will mean customers are not able to use the proxy, because it still uses the BSSID as the Called-Station-Id which is not useful. In your previous reply, you state "The change from BSSID to MAC address does now align with the rest of the industry" - but not if using proxy 🤔
... View more
May 27 2021
10:25 AM
What do you mean, you don't support it because you use it? 🙂 If a packet is being proxied from an AP, it should honour the same going through the proxy. If you can customise the NAS-ID when going through the proxy, what's the problem doing the same for Called-Station-Id? This effectively means the proxy is useless as it can't be set to what it needs to be...
... View more
May 24 2021
1:21 PM
Hi Rodrigo Correct, on the Access Control page. This is what I have set: Association requirements: MAC-based access control Splash page: None or Click-through Scroll down to the RADIUS options and set: RADIUS CoA support: Unchecked RADIUS proxy: Checked You'll see when you enable the RADIUS proxy option, the new Called-Station-Id option disappears but the NAS-ID option is there! Thanks
... View more
May 24 2021
12:02 PM
Thanks Rodrigo! This is also a similar query - wondering if you might be able to answer? https://community.meraki.com/t5/Wireless-LAN/Mac-based-authentication-with-ISE-cloud-RADIUS-server-and-CoA/m-p/119165#M17008 Thanks James
... View more
May 21 2021
3:27 PM
Something I noticed... when you enable the RADIUS proxy option, the setting for the Called-Station-Id format disappears, but the NAS-ID format option is there.. this seems a little odd and I don't understand why you still can't set both? Without proxy: With proxy: Bug, or something else? Thanks J
... View more
May 20 2021
10:27 AM
Brilliant so what you are confirming is that in MR28, by default, without the customer logging in and making a change, it will now start sending the AP MAC address in the Called-Station-Id by default (unless configured otherwise), and now include the NAS-ID and the two extra Meraki vendor specific attributes? 😁
... View more
May 20 2021
1:13 AM
1 Kudo
Thanks Rodrigo A couple of observations: On our existing WPA2 enterprise SSID, after upgrading to MR28, it started using the new Called-Station-Id settings without me setting/changing anything on the Meraki dashboard. Also, when I created a new SSID and set it to MAC-based control only, and configured basic radius servers, it too automatically uses the new Called-Station-Id settings without me setting anything. It seems the default setting for both Called-Station-Id and NAS-ID is "AP MAC address::SSID Name" / "AP MAC address::SSID Number" respectively - is this correct? (This is good for us, not complaining!) Prior to MR28, when I connect to the SSID, it sent the following packet: User-Name = "112233445566"
User-Password = ""
NAS-IP-Address = 0.0.0.0
Called-Station-Id = "0C-8D-DB-11-22-33:Free_WiFi"
Calling-Station-Id = "99-88-77-66-55-44"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b" and since MR28 we now see: User-Name = "112233445566"
User-Password = ""
NAS-IP-Address = 192.168.1.89
++ Service-Type = Call-Check
>> Called-Station-Id = "0C-8D-DB-11-22-33:Free_WiFi"
Calling-Station-Id = "99-88-77-66-55-44"
>> NAS-Identifier = "0C-8D-DB-11-22-33:vap1"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
++ Meraki-Device-Name = "0c:8d:db:11:22:33"
++ Meraki-Network-Name = "Test - wireless" The lines marked >> are the new, configurable ones and the ones with ++ are now being included as extra, which is great. Is this what is to be expected? Does this mean that once a customer upgrades to MR28, it will automatically start sending the new extra attributes, and changes the Called-Station-Id and NAS-ID to the default format as per above (which is much better than sending the BSSID MAC) Again, not a complaint (been waiting for this for years), just ensuring I have my facts correct. Thanks, James
... View more
May 19 2021
12:28 PM
Great - can you tell me, the new RADIUS options for Called-Station-Id and NAS-ID, what RADIUS requests do they affect? Does it change all RADIUS traffic, even Captive portal RADIUS, or just 802.1x. Is MAC authentication also included? At present, without setting any of the new options, captive portal RADIUS traffic uses the AP MAC address as the Called-Station-Id, but 802.1x and MAC authentication uses the BSSID MAC instead. Thanks, James
... View more
May 19 2021
4:49 AM
Hi Alexander Might you be able to provide some more detail/documentation around this in particular: [New] RADIUS enhancements (e.g., NAS-ID configuration, Called-Station ID configuration) Thanks, J
... View more
Nov 15 2018
7:52 AM
Hi Jonas You are correct. If you manually open a browser and try to browse to a URL that starts with https:// (or a site that only uses https://) - then the AP cannot redirect you to the splash page, because it cannot intercept the traffic. Therefore, it will time out. To reach the splash page, you have to navigate to a http:// site. I understand this is difficult to have users understand and they will typically just try and search Google from their browser, which will also fail as Google use https:// also. This isn't a Meraki thing, it's an industry standard problem with captive portals and https (SSL). If you try the same on another make of AP you'll see the same behaviour. It's just the way it is I'm afraid. Some AP manufactures try to intercept the https:// request, but this IMO is worse because it then throws a big SSL warning/error page to the user saying the Certificate is invalid any your session might be hijacked (man in the middle warning). this happens because the SSL certificate provided is not the real one, but one provided by the AP and of course the host name on the certificate does not match. But, the issue here is that you shouldn't get to a position where you need to open a browser and visit a http site. You should automatically get the CNA popup which will then correctly show the splash page on the device. P.S. There is no problem hosting your splash page on https:// - because the splash URL is in your allowed Walled garden list, so that traffic CAN reach the real site. The CNA check on iOS/Android/Windows etc is always a http:// request by the way,otherwise that would fail. Thanks James https://purple.ai
... View more
Nov 15 2018
7:32 AM
Hi Jonas Yeah, when you connect to the SSID the Apple device should automatically fire a HTTP request to an apple URL to detect if its in a captive portal or not. If it is, i.e. it cannot reach this URL, it should automatically popup the CNA and redirect to your configured splash URL. If this isn't happening then first ensure you haven't got any apple based domains in your Walled Garden and that Auto-Join and Auto-Login is enabled on the iOS device itself, under the SSID settings. Thanks James Purple https://purple.ai
... View more